crowdstrike/ioc Dashboards
Domain overview
Widget | Description | Type |
---|---|---|
Location of client IP addresses present in IOC. Note - location of
client IP does not always correlate with actual physical location
of user or system
logscale
| World Map | |
Pie chart showing breakdown of threat types (linked to client IP)
logscale
| Pie Chart | |
Links client IP IOC labels to the different values of each label
logscale
| Sankey | |
Pie chart showing breakdown of threat actors (linked to client IP)
logscale
| Pie Chart | |
Pie chart showing breakdown of kill chain values (linked to client
IP)
logscale
| Pie Chart | |
Detailed information of all threats found in client IPs
logscale
| Table | |
Pie chart showing breakdown of malware types (linked to client IP)
logscale
| Pie Chart | |
# All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events | Note |
IP overview
Widget | Description | Type |
---|---|---|
Location of client IP addresses present in IOC. Note - location of
client IP does not always correlate with actual physical location
of user or system
logscale
| World Map | |
Pie chart showing breakdown of threat types (linked to client IP)
logscale
| Pie Chart | |
Links client IP IOC labels to the different values of each label
logscale
| Sankey | |
Pie chart showing breakdown of threat actors (linked to client IP)
logscale
| Pie Chart | |
Pie chart showing breakdown of kill chain values (linked to client
IP)
logscale
| Pie Chart | |
Detailed information of all threats found in client IPs
logscale
| Table | |
Pie chart showing breakdown of malware types (linked to client IP)
logscale
| Pie Chart | |
# All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events | Note |
Overview
Widget | Description | Type |
---|---|---|
Displays a flow chart of threat attributes based on URL, IP and
domain data.
logscale
| Sankey | |
Displays threat severity over time using URL, IP address, and
domain.
logscale
| Time Chart | |
Displays a list of threats by confidence level based on URLs, IP
addresses, and domains.
logscale
| Pie Chart | |
Please use these dashboards as inspiration on building your own security insights. To get started, edit the queries in the widget to insert the right field names you want to look up IOC matches on. | Note |
URL overview
Widget | Description | Type |
---|---|---|
Location of client IP addresses present in IOC. Note - location of
client IP does not always correlate with actual physical location
of user or system
logscale
| World Map | |
Pie chart showing breakdown of threat types (linked to client IP)
logscale
| Pie Chart | |
Links client IP IOC labels to the different values of each label
logscale
| Sankey | |
Pie chart showing breakdown of threat actors (linked to client IP)
logscale
| Pie Chart | |
Pie chart showing breakdown of kill chain values (linked to client
IP)
logscale
| Pie Chart | |
Detailed information of all threats found in client IPs
logscale
| Table | |
Pie chart showing breakdown of malware types (linked to client IP)
logscale
| Pie Chart | |
# All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events | Note |